Hacker News new | past | comments | ask | show | jobs | submit login

it's also why you shouldn't abuse Tor with web scraping or other actions that lead to sites blocking it



This is why you shouldn't use CloudFlare, whose good intentions lead to not so good places


When 80% of traffic from an IP is malicious and the other 20% is regular traffic, but both sources look like the same traffic (impersonating browser headers, sometimes running headless chromium), what else can you do? Cookies and stateful cookie-like objects, such as privacy pass.

Can anyone report how well privacy pass works nowadays?


> When 80% of traffic from an IP is malicious and the other 20% is regular traffic, but both sources look like the same traffic (impersonating browser headers, sometimes running headless chromium), what else can you do?

Accept the traffic, taking the bad with the good. We all know the ills of visitor profiling regardless of effectiveness.


That's an easy position to take when you personally do not bear the expense of the extra bandwidth, increased hardware needed to ensure acceptable response times, and cleanup/reputation damage when you are compromised.

All of these things have a cost, and they should be balanced against the benefit seen by allowing open access.


The times I've had to use Tor, privacypass has been usable.


So uh, why does “malicious” traffic need to be blocked?


Because nobody is entitled to receive response packets from my computer.


That doesn’t explain why you’d waste your time blocking this traffic. In fact, that explains precisely nothing.


you != you




Applications are open for YC Winter 2020

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: